2014-01-31 15:39:50 +01:00
|
|
|
# WPA2-Personal tests
|
|
|
|
# Copyright (c) 2014, Qualcomm Atheros, Inc.
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
2014-03-29 08:51:54 +01:00
|
|
|
import os
|
2014-09-24 15:13:44 +02:00
|
|
|
import subprocess
|
|
|
|
import time
|
2014-01-31 15:39:50 +01:00
|
|
|
|
|
|
|
import hostapd
|
2014-03-15 23:13:23 +01:00
|
|
|
import hwsim_utils
|
2014-01-31 15:39:50 +01:00
|
|
|
|
2014-04-05 22:56:03 +02:00
|
|
|
def check_mib(dev, vals):
|
|
|
|
mib = dev.get_mib()
|
|
|
|
for v in vals:
|
|
|
|
if mib[v[0]] != v[1]:
|
|
|
|
raise Exception("Unexpected {} = {} (expected {})".format(v[0], mib[v[0]], v[1]))
|
|
|
|
|
2014-01-31 15:39:50 +01:00
|
|
|
def test_ap_wpa2_psk(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with PSK instead of passphrase"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid)
|
|
|
|
params['wpa_psk'] = psk
|
2014-03-22 17:57:44 +01:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
key_mgmt = hapd.get_config()['key_mgmt']
|
|
|
|
if key_mgmt.split(' ')[0] != "WPA-PSK":
|
|
|
|
raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
|
2014-01-31 15:39:50 +01:00
|
|
|
dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
|
|
|
|
dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
|
2014-04-12 00:02:19 +02:00
|
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
|
|
pkt = dev[0].request("PKTCNT_POLL").splitlines()
|
|
|
|
if "FREQUENCY=2412" not in sig:
|
|
|
|
raise Exception("Unexpected SIGNAL_POLL value: " + str(sig))
|
|
|
|
if "TXBAD=0" not in pkt:
|
|
|
|
raise Exception("Unexpected TXBAD value: " + str(pkt))
|
|
|
|
|
2014-01-31 15:39:50 +01:00
|
|
|
def test_ap_wpa2_psk_file(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with PSK from a file"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_psk_file'] = 'hostapd.wpa_psk'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
|
|
|
|
dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
|
|
|
|
dev[2].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].connect(ssid, psk="very secret", scan_freq="2412")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
|
|
|
|
dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
|
|
|
|
ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timed out while waiting for failure report")
|
|
|
|
dev[1].request("REMOVE_NETWORK all")
|
2014-03-15 23:13:23 +01:00
|
|
|
|
2014-04-05 18:10:27 +02:00
|
|
|
def test_ap_wpa2_ptk_rekey(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and PTK rekey enforced by station"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-04-05 18:10:27 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-04-05 18:10:27 +02:00
|
|
|
|
2014-06-01 10:47:37 +02:00
|
|
|
def test_ap_wpa2_ptk_rekey_ap(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and PTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_ptk_rekey'] = '2'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:47:37 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:47:37 +02:00
|
|
|
|
2014-04-05 18:10:27 +02:00
|
|
|
def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
|
|
|
|
"""WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-04-05 18:10:27 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
|
|
|
|
wpa_ptk_rekey="1", scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-04-05 22:56:03 +02:00
|
|
|
check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
|
|
|
|
("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
|
2014-04-05 18:10:27 +02:00
|
|
|
|
2014-06-01 10:47:37 +02:00
|
|
|
def test_ap_wpa2_sha256_ptk_rekey_ap(dev, apdev):
|
|
|
|
"""WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
|
|
|
|
params['wpa_ptk_rekey'] = '2'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:47:37 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
|
|
|
|
scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:47:37 +02:00
|
|
|
check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
|
|
|
|
("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
|
|
|
|
|
2014-03-15 23:13:23 +01:00
|
|
|
def test_ap_wpa_ptk_rekey(dev, apdev):
|
|
|
|
"""WPA-PSK/TKIP AP and PTK rekey enforced by station"""
|
|
|
|
ssid = "test-wpa-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-03-15 23:13:23 +01:00
|
|
|
dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
|
2014-04-26 16:18:37 +02:00
|
|
|
if "[WPA-PSK-TKIP]" not in dev[0].request("SCAN_RESULTS"):
|
|
|
|
raise Exception("Scan results missing WPA element info")
|
2014-03-15 23:13:23 +01:00
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"])
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-03-29 08:51:54 +01:00
|
|
|
|
2014-06-01 10:47:37 +02:00
|
|
|
def test_ap_wpa_ptk_rekey_ap(dev, apdev):
|
|
|
|
"""WPA-PSK/TKIP AP and PTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_ptk_rekey'] = '2'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:47:37 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Key negotiation completed"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:47:37 +02:00
|
|
|
|
2014-04-05 22:35:17 +02:00
|
|
|
def test_ap_wpa_ccmp(dev, apdev):
|
|
|
|
"""WPA-PSK/CCMP"""
|
|
|
|
ssid = "test-wpa-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_pairwise'] = "CCMP"
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-04-05 22:35:17 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-04-05 22:56:03 +02:00
|
|
|
check_mib(dev[0], [ ("dot11RSNAConfigGroupCipherSize", "128"),
|
|
|
|
("dot11RSNAGroupCipherRequested", "00-50-f2-4"),
|
|
|
|
("dot11RSNAPairwiseCipherRequested", "00-50-f2-4"),
|
|
|
|
("dot11RSNAAuthenticationSuiteRequested", "00-50-f2-2"),
|
|
|
|
("dot11RSNAGroupCipherSelected", "00-50-f2-4"),
|
|
|
|
("dot11RSNAPairwiseCipherSelected", "00-50-f2-4"),
|
|
|
|
("dot11RSNAAuthenticationSuiteSelected", "00-50-f2-2"),
|
|
|
|
("dot1xSuppSuppControlledPortStatus", "Authorized") ])
|
2014-04-05 22:35:17 +02:00
|
|
|
|
2014-03-29 08:51:54 +01:00
|
|
|
def test_ap_wpa2_psk_file(dev, apdev):
|
|
|
|
"""WPA2-PSK AP with various PSK file error and success cases"""
|
|
|
|
addr0 = dev[0].p2p_dev_addr()
|
|
|
|
addr1 = dev[1].p2p_dev_addr()
|
|
|
|
addr2 = dev[2].p2p_dev_addr()
|
|
|
|
ssid = "psk"
|
|
|
|
pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
|
|
|
|
try:
|
|
|
|
os.remove(pskfile)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
|
|
|
params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
|
|
|
|
"rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
|
|
|
|
|
|
|
|
try:
|
|
|
|
# missing PSK file
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
|
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
|
raise Exception("Unexpected ENABLE success")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
|
|
|
|
# invalid MAC address
|
|
|
|
with open(pskfile, "w") as f:
|
|
|
|
f.write("\n")
|
|
|
|
f.write("foo\n")
|
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
|
raise Exception("Unexpected ENABLE success")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
|
|
|
|
# no PSK on line
|
|
|
|
with open(pskfile, "w") as f:
|
|
|
|
f.write("00:11:22:33:44:55\n")
|
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
|
raise Exception("Unexpected ENABLE success")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
|
|
|
|
# invalid PSK
|
|
|
|
with open(pskfile, "w") as f:
|
|
|
|
f.write("00:11:22:33:44:55 1234567\n")
|
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
|
raise Exception("Unexpected ENABLE success")
|
|
|
|
hapd.request("DISABLE")
|
|
|
|
|
|
|
|
# valid PSK file
|
|
|
|
with open(pskfile, "w") as f:
|
|
|
|
f.write("00:11:22:33:44:55 12345678\n")
|
|
|
|
f.write(addr0 + " 123456789\n")
|
|
|
|
f.write(addr1 + " 123456789a\n")
|
|
|
|
f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
|
|
|
|
if "FAIL" in hapd.request("ENABLE"):
|
|
|
|
raise Exception("Unexpected ENABLE failure")
|
|
|
|
|
|
|
|
dev[0].connect(ssid, psk="123456789", scan_freq="2412")
|
|
|
|
dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
|
|
|
|
dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
|
|
|
|
|
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
os.remove(pskfile)
|
|
|
|
except:
|
|
|
|
pass
|
2014-04-12 21:47:49 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_psk_wildcard_ssid(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and wildcard SSID configuration"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("", bssid=apdev[0]['bssid'], psk=passphrase,
|
|
|
|
scan_freq="2412")
|
|
|
|
dev[1].connect("", bssid=apdev[0]['bssid'], raw_psk=psk, scan_freq="2412")
|
2014-06-01 10:59:23 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_gtk_rekey(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and GTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_group_rekey'] = '1'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:59:23 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Group rekeying completed"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("GTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:59:23 +02:00
|
|
|
|
|
|
|
def test_ap_wpa_gtk_rekey(dev, apdev):
|
|
|
|
"""WPA-PSK/TKIP AP and GTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_group_rekey'] = '1'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:59:23 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
ev = dev[0].wait_event(["WPA: Group rekeying completed"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("GTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:59:23 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_gmk_rekey(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and GMK and GTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_group_rekey'] = '1'
|
|
|
|
params['wpa_gmk_rekey'] = '2'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:59:23 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
for i in range(0, 3):
|
|
|
|
ev = dev[0].wait_event(["WPA: Group rekeying completed"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("GTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-06-01 10:59:23 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_strict_rekey(dev, apdev):
|
|
|
|
"""WPA2-PSK AP and strict GTK rekey enforced by AP"""
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['wpa_strict_rekey'] = '1'
|
2014-10-19 16:54:49 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
2014-06-01 10:59:23 +02:00
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
ev = dev[0].wait_event(["WPA: Group rekeying completed"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("GTK rekey timed out")
|
2014-10-19 16:54:49 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2014-09-24 15:13:44 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_bridge_fdb(dev, apdev):
|
|
|
|
"""Bridge FDB entry removal"""
|
|
|
|
try:
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = "12345678"
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
|
|
|
params['bridge'] = 'ap-br0'
|
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
subprocess.call(['sudo', 'brctl', 'setfd', 'ap-br0', '0'])
|
|
|
|
subprocess.call(['sudo', 'ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412",
|
|
|
|
bssid=apdev[0]['bssid'])
|
|
|
|
dev[1].connect(ssid, psk=passphrase, scan_freq="2412",
|
|
|
|
bssid=apdev[0]['bssid'])
|
|
|
|
addr0 = dev[0].p2p_interface_addr()
|
|
|
|
hwsim_utils.test_connectivity_sta(dev[0], dev[1])
|
|
|
|
cmd = subprocess.Popen(['brctl', 'showmacs', 'ap-br0'],
|
|
|
|
stdout=subprocess.PIPE)
|
|
|
|
macs1 = cmd.stdout.read()
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
|
|
time.sleep(1)
|
|
|
|
cmd = subprocess.Popen(['brctl', 'showmacs', 'ap-br0'],
|
|
|
|
stdout=subprocess.PIPE)
|
|
|
|
macs2 = cmd.stdout.read()
|
|
|
|
|
|
|
|
addr1 = dev[1].p2p_interface_addr()
|
|
|
|
if addr0 not in macs1 or addr1 not in macs1:
|
|
|
|
raise Exception("Bridge FDB entry missing")
|
|
|
|
if addr0 in macs2 or addr1 in macs2:
|
|
|
|
raise Exception("Bridge FDB entry was not removed")
|
|
|
|
finally:
|
|
|
|
subprocess.call(['sudo', 'ip', 'link', 'set', 'dev', 'ap-br0', 'down'])
|
|
|
|
subprocess.call(['sudo', 'brctl', 'delbr', 'ap-br0'])
|
2014-10-10 17:03:05 +02:00
|
|
|
|
|
|
|
def test_ap_wpa2_psk_ext(dev, apdev):
|
|
|
|
"""WPA2-PSK AP using external EAPOL I/O"""
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
ssid = "test-wpa2-psk"
|
|
|
|
passphrase = 'qwertyuiop'
|
|
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
|
|
params = hostapd.wpa2_params(ssid=ssid)
|
|
|
|
params['wpa_psk'] = psk
|
|
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
hapd.request("SET ext_eapol_frame_io 1")
|
|
|
|
dev[0].request("SET ext_eapol_frame_io 1")
|
|
|
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412", wait_connect=False)
|
|
|
|
addr = dev[0].p2p_interface_addr()
|
|
|
|
while True:
|
|
|
|
ev = hapd.wait_event(["EAPOL-TX", "AP-STA-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on EAPOL-TX from hostapd")
|
|
|
|
if "AP-STA-CONNECTED" in ev:
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on connection event from wpa_supplicant")
|
|
|
|
break
|
|
|
|
res = dev[0].request("EAPOL_RX " + bssid + " " + ev.split(' ')[2])
|
|
|
|
if "OK" not in res:
|
|
|
|
raise Exception("EAPOL_RX to wpa_supplicant failed")
|
|
|
|
ev = dev[0].wait_event(["EAPOL-TX", "CTRL-EVENT-CONNECTED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Timeout on EAPOL-TX from wpa_supplicant")
|
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
break
|
|
|
|
res = hapd.request("EAPOL_RX " + addr + " " + ev.split(' ')[2])
|
|
|
|
if "OK" not in res:
|
|
|
|
raise Exception("EAPOL_RX to hostapd failed")
|